Ranking of closeness centrality for large-scale social networks

K Okamoto, W Chen, XY Li - International workshop on frontiers in …, 2008 - Springer
Closeness centrality is an important concept in social network analysis. In a graph
representing a social network, closeness centrality measures how close a vertex is to all …

An annotated bibliography on guaranteed graph searching

FV Fomin, DM Thilikos - Theoretical computer science, 2008 - Elsevier
Graph searching encompasses a wide variety of combinatorial problems related to the
problem of capturing a fugitive residing in a graph using the minimum number of searchers …

[HTML][HTML] Connected graph searching

L Barrière, P Flocchini, FV Fomin, P Fraigniaud… - Information and …, 2012 - Elsevier
In the graph searching game the opponents are a set of searchers and a fugitive in a graph.
The searchers try to capture the fugitive by applying some sequence of moves that include …

Decontaminating chordal rings and tori using mobile agents

P Flocchini, MJ Huang, FL Luccio - International Journal of …, 2007 - World Scientific
In this paper we consider a network where an intruder is moving" contaminating" the nodes it
passes by, and we focus on the problem of decontaminating such a network by a team of …

Suade: Topology-based searches for software investigation

FW Warr, MP Robillard - 29th International Conference on …, 2007 - ieeexplore.ieee.org
The investigation of a software system prior to a modification task often constitutes an
important fraction of the overall effort associated with the task. We present Suade, an Eclipse …

[PDF][PDF] Future trends in database systems

M Stonebraker - IEEE Transactions on Knowledge and Data …, 1989 - db.cs.berkeley.edu
This paper discusses the likely evolution of commercial data managers over the next several
years. Topics to be covered include: Why SQL has become an intergalactic standard. Who …

Graph searching with advice

N Nisse, D Soguet - Theoretical Computer Science, 2009 - Elsevier
Fraigniaud et al.[L. Blin, P. Fraigniaud, N. Nisse, S. Vial, Distributing chasing of network
intruders, in: 13th Colloquium on Structural Information and Communication Complexity …

[PS][PS] Size Optimal Strategies for Capturing an Intruder in Mesh Networks Ѓ

P Flocchini, FL Luccio, LX Song - 2005 - site.uottawa.ca
In this paper we consider the problem of capturing an intruder in a networked environment.
The intruder is defined as a mobile entity that moves inside the network and escapes from a …

Distributed chasing of network intruders

L Blin, P Fraigniaud, N Nisse, S Vial - Theoretical Computer Science, 2008 - Elsevier
Graph searching is one of the most popular tools for analyzing the chase for a powerful and
hostile software agent (called the “intruder”), by a set of software agents (called the …

Connected searching of weighted trees

D Dereniowski - Theoretical Computer Science, 2011 - Elsevier
In this paper we consider the problem of connected edge searching of weighted trees.
Barrière et al. claim in [L. Barrière, P. Flocchini, P. Fraigniaud, N. Santoro, Capture of an …